Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise...
Search results for: shadow IT

[Infographic] Global remote work stats in 2020 for IT admins
In 2020, the pandemic forced huge corporations to accelerate executing plans most of them had for many years — having a hybrid workforce. But moving all or...

How to secure your network from a Ryuk ransomware attack
Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk...
IT security under attack blog series: Instant domain persistence by registering a rogue domain controller
In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain...

CISO’s guide to building an ironclad data loss prevention strategy [E-book]
“The Global Datasphere will grow from 45 Zettabytes (ZB) in 2019 to 175ZB by 2025.” – International Data Corporation (IDC) As data proliferates, traditional data...

Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals
“We have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” – FBI, CISA, and HHS A cybersecurity bulletin...

Five reasons why Remote Access Plus is your comprehensive solution for supporting remote workers
Remote work has been on the rise since 2005 and has seen over 159 percent growth in the past 12 years. And now, with the COVID-19 pandemic, we’re seeing widespread...
Introducing our free Secure Remote Access Toolkit for IT teams
The global corporate landscape is on the brink of a complete premises lockdown in light of the COVID-19 crisis. Service disruption is inevitable, and enterprises’...